1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksenya-84 [330]
3 years ago
6

When code is compiled it

Computers and Technology
2 answers:
lesantik [10]3 years ago
5 0

Answer:

A compiler takes the program code (source code) and converts the source code to a machine language module (called an object file). Another specialized program, called a linker, combines this object file with other previously compiled object files (in particular run-time modules) to create an executable file. In short, it's A or D.

Alina [70]3 years ago
5 0

Answer:

D - is coverted to binary code

Explanation:

A compiler takes the program code (source code) and converts the source code to a machine language module (called an object file). Another specialized program, called a linker, combines this object file with other previously compiled object files (in particular run-time modules) to create an executable file.

You might be interested in
Which of the following is an example of an output device on a smartphone?
Andru [333]

Answer:

The speaker

Explanation:

Speakers are output devices because the audio is taken from the app or website and playing it towards the speakers.

7 0
3 years ago
Al encender manda un mensaje de que Windows se cerró de manera inesperada y da varías opciones pero se elige la que sea, regresa
vagabundo [1.1K]

Answer:

6

Explanation:

4 0
3 years ago
A database administrator (DBA) must have a clear understanding of the fundamental business of an organization, be proficient in
Alexus [3.1K]

Answer: True

Explanation:

 Yes, the given statement is true that the DBA (Database administrator) utilize particular programming to store and arrange information.

The DBA is the proper understanding of the comprehension of the key business of an association, be capable in the utilization of chose database the executives frameworks, and remain side by side of developing advancements and new plan draws near.

The main purpose of the database administrator that it incorporate scope organization, establishment, setup, database plan, movement, execution checking, security, investigating, just as reinforcement and information recovery.

8 0
4 years ago
What do the blocks in the looks category do?
mart [117]

Answer:

if u have a question can I see it

Explanation:

so I can know the answer choose

6 0
3 years ago
Your company wants to use an IoT device but wants to make sure it does not interfere with other RF devices that use the 2.4 GHz
Karo-lina-s [1.5K]

Answer:

Option 3 i.e., Z-Wave.

Explanation:

The Z-Wave device should be purchased by the company because It is a standard for connectivity, used mainly for smart home devices that use the 2.4 GHz RF band and this is also that device which the company wanted for the 50 meters away from the base station.  

So, It is a device should be purchased by the company.

Other options are incorrect because those devices not accomplish the following requirements.

7 0
3 years ago
Other questions:
  • Marie can now edit her photos, send them in emails, print them on a printer, and use them as wallpaper on her computer. This is
    9·2 answers
  • Which of the following represent features of
    6·1 answer
  • You put $500 in an interest bearing bank account that pays 2% per year but has a fee of $2 per month. Are you getting ahead?
    14·2 answers
  • How do you get free Wifi on your phone without paying
    6·1 answer
  • Low-end CRM systems are designed for companies like Boeing because they only have a few, large customers.
    11·1 answer
  • Give a recursive algorithm to compute the sum of the cubes of the first n positive integers. The input to the algorithm is a pos
    5·1 answer
  • I am needing help with this homework of mine.
    7·1 answer
  • A sequential algorithm is broken into three stages
    14·2 answers
  • Civil engineering structures are also called _________.
    15·1 answer
  • Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the publi
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!